DocumentCode :
2049690
Title :
The Fine Print of Security
Author :
Abadi, Martin
Author_Institution :
Microsoft Res., Univ. of California, Santa Cruz, CA, USA
fYear :
2010
fDate :
11-14 July 2010
Firstpage :
110
Lastpage :
110
Abstract :
Summary form only given. Simple views of systems are often convenient in their design and analysis. However, attackers may attempt to exploit any oversimplification. For security, it is therefore useful to understand the value and the limitations of simplistic models. Computational-soundness theorems, which are the main subject of this lecture, can sometimes shed light on this question. We discuss them first in the context of security protocols. There, two distinct, rigorous views of cryptography have developed over the years. One of the views relies on a simple but powerful symbolic approach; the other, on a detailed computational model that considers issues of probability and complexity. In the last decade, however, we have made substantial progress in bridging the gap between these views. This progress, of which a paper with Phil Rogaway was one of the early steps, is due to many researchers. By now, this line of work provides computational justifications for formal treatments of cryptographic operations and security protocols, and also explores hybrid approaches. Similar ideas can apply in the domain of software protection, although they are less mature in this domain. Specifically, we can relate high-level security guarantees, of the kind offered by programming-language semantics, with lower-level properties of implementations. Layout randomization, one popular and effective implementation technique, again brings up issues of probability and complexity. The lecture introduces some recent work with Gordon Plotkin on this topic.
Keywords :
cryptographic protocols; programming language semantics; computational-soundness theorems; cryptographic operations; layout randomization; probability; programming-language semantics; security protocols; software protection; Complexity theory; Computational modeling; Cryptography; Protocols; Semantics; Silicon;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Logic in Computer Science (LICS), 2010 25th Annual IEEE Symposium on
Conference_Location :
Edinburgh
ISSN :
1043-6871
Print_ISBN :
978-1-4244-7588-9
Electronic_ISBN :
1043-6871
Type :
conf
DOI :
10.1109/LICS.2010.9
Filename :
5570995
Link To Document :
بازگشت